6,838 research outputs found
Mobile Broadband Possibilities considering the Arrival of IEEE 802.16m & LTE with an Emphasis on South Asia
This paper intends to look deeper into finding an ideal mobile broadband
solution. Special stress has been put in the South Asian region through some
comparative analysis. Proving their competency in numerous aspects, WiMAX and
LTE already have already made a strong position in telecommunication industry.
Both WiMAX and LTE are 4G technologies designed to move data rather than voice
having IP networks based on OFDM technology. So, they aren't like typical
technological rivals as of GSM and CDMA. But still a gesture of hostility seems
to outburst long before the stable commercial launch of LTE. In this paper
various aspects of WiMAX and LTE for deployment have been analyzed. Again, we
tried to make every possible consideration with respect to south Asia i.e. how
mass people of this region may be benefited. As a result, it might be regarded
as a good source in case of making major BWA deployment decisions in this
region. Besides these, it also opens the path for further research and in depth
thinking in this issue.Comment: IEEE Publication format, ISSN 1947 5500,
http://sites.google.com/site/ijcsis
A cooperative cellular and broadcast conditional access system for Pay-TV systems
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.The lack of interoperability between Pay-TV service providers and a horizontally integrated business transaction model have compromised the competition in the Pay-TV market. In addition, the lack of interactivity with customers has resulted in high churn rate and improper security measures have contributed into considerable business loss. These issues are the main cause of high operational costs and subscription fees in the Pay-TV systems. As a result, this paper presents the Mobile Conditional Access System (MICAS) as an end-to-end access control solution for Pay-TV systems. It incorporates the mobile and broadcasting systems and provides a platform whereby service providers can effectively interact with their customers, personalize their services and adopt appropriate security measurements. This would result in the decrease of operating expenses and increase of customers' satisfaction in the system. The paper provides an overview of state-of-the-art conditional access solutions followed by detailed description of design, reference model implementation and analysis of possible MICAS security architectures.Strategy & Technology (S&T) Lt
3G UMTS man in the middle attacks and policy reform considerations
Man in the middle attacks on 3G UMTS have been a known vulnerability since at least 2004. Many experts have presented solutions to resolve this issue. The first attempt to mitigate the issue in the form of mutual authentication fell short. It is now public knowledge that law enforcement and the FBI have used this man in the middle style attack to collect intelligence within the United States. It is imperative we openly acknowledge that while the man in the middle attack has immediate benefits, there are also inherent risks to maintaining a lower standard of security.
There has been no official documentation from these agencies on the protocol used to conduct these collections. This paper will outline the deficiency in GSM and UMTS, show how a man in the middle style attack would work and what is keeping the attack still possible after so many years.
Finally, there will be four points to consider for preliminary policy reform; constitutionality, oversight, vulnerability, and protection
A Survey on Handover Management in Mobility Architectures
This work presents a comprehensive and structured taxonomy of available
techniques for managing the handover process in mobility architectures.
Representative works from the existing literature have been divided into
appropriate categories, based on their ability to support horizontal handovers,
vertical handovers and multihoming. We describe approaches designed to work on
the current Internet (i.e. IPv4-based networks), as well as those that have
been devised for the "future" Internet (e.g. IPv6-based networks and
extensions). Quantitative measures and qualitative indicators are also
presented and used to evaluate and compare the examined approaches. This
critical review provides some valuable guidelines and suggestions for designing
and developing mobility architectures, including some practical expedients
(e.g. those required in the current Internet environment), aimed to cope with
the presence of NAT/firewalls and to provide support to legacy systems and
several communication protocols working at the application layer
Estimating Dynamic Load Parameters from Ambient PMU Measurements
In this paper, a novel method to estimate dynamic load parameters via ambient
PMU measurements is proposed. Unlike conventional parameter identification
methods, the proposed algorithm does not require the existence of large
disturbance to power systems, and is able to provide up-to-date dynamic load
parameters consistently and continuously. The accuracy and robustness of the
method are demonstrated through numerical simulations.Comment: The paper has been accepted by IEEE PES general meeting 201
- âŠ